Results 61 to 70 of about 4,920 (187)
Provable security signcryption scheme based on RLWE without trapdoor
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU +3 more
doaj +2 more sources
Badly approximable grids and k$k$‐divergent lattices
Abstract Let A∈Matm×n(R)$A\in \operatorname{Mat}_{m\times n}(\mathbb {R})$ be a matrix. In this paper, we investigate the set BadA⊂Tm$\operatorname{Bad}_A\subset \mathbb {T}^m$ of badly approximable targets for A$A$, where Tm$\mathbb {T}^m$ is the m$m$‐torus. It is well known that BadA$\operatorname{Bad}_A$ is a winning set for Schmidt's game and hence
Nikolay Moshchevitin +2 more
wiley +1 more source
Multi‐hop anonymous payment channel network based on onion routing
To solve the payment channel network path privacy problem, we analyse the multi‐hop anonymous and privacy‐preserving payment channel network scheme and propose a multi‐hop anonymous payment channel network based on onion routing based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing‐based payment ...
Caimei Wang, Yudong Ren, Zhize Wu
wiley +1 more source
Preimage Attacks on Reduced Tiger and SHA-2 [PDF]
This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel presented a preimage attack on Tiger reduced to 13 rounds (out of 24) with a complexity of 2128.5. Our new preimage attack finds a one-block preimage of Tiger reduced to 16 rounds with a complexity of 2161. The proposed attack is based on meet-in-the-middle attacks.
Takanori Isobe, Kyoji Shibutani
openaire +1 more source
Picard sheaves, local Brauer groups, and topological modular forms
Abstract We develop tools to analyze and compare the Brauer groups of spectra such as periodic complex and real K$K$‐theory and topological modular forms, as well as the derived moduli stack of elliptic curves. In particular, we prove that the Brauer group of TMF$\mathrm{TMF}$ is isomorphic to the Brauer group of the derived moduli stack of elliptic ...
Benjamin Antieau +2 more
wiley +1 more source
A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain
Nowadays, blockchain has become one of the most cutting-edge technologies, which has been widely concerned and researched. However, the quantum computing attack seriously threatens the security of blockchain, and related research is still less. Targeting
Yu-Long Gao +5 more
doaj +1 more source
Concurrent Knowledge-Extraction in the Public-Key Model [PDF]
Knowledge extraction is a fundamental notion, modelling machine possession of values (witnesses) in a computational complexity sense. The notion provides an essential tool for cryptographic protocol design and analysis, enabling one to argue about the ...
Yao, Andrew C., Yung, Moti, Zhao, Yunlei
core +2 more sources
International Consensus Statement on Allergy and Rhinology: Sinonasal Tumors
Abstract Background Sinonasal neoplasms, whether benign and malignant, pose a significant challenge to clinicians and represent a model area for multidisciplinary collaboration in order to optimize patient care. The International Consensus Statement on Allergy and Rhinology: Sinonasal Tumors (ICSNT) aims to summarize the best available evidence and ...
Edward C. Kuan +158 more
wiley +1 more source
Partial pre-image attack on Proof-of-Work based blockchains
Blockchain is a type of distributed ledger technology that consists of a growing list of records, called blocks, that are securely linked together using cryptography.
Hamza Baniata, Attila Kertesz
doaj +1 more source
Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl +3 more
doaj +1 more source

